Treffer 1 - 20
von 1.431
- 1
- 2
Seite in der Trefferliste auswählen
Object oriented verification kernels for secure Java applications
Grandy, H. ; Stenzel, K. ; Reif, W.
Third IEEE International Conference on Software Engineering and Formal Methods (SEFM'05) Software Engineering and Formal Methods Software Engineering and Formal Methods, 2005. SEFM 2005. Third IEEE International Conference on. :170-179 2005
Object Oriented Verification Kernels for Secure Java Applications
Holger Grandy ; Kurt Stenzel ; Wolfgang Reif ; et al.
http://www.informatik.uni-augsburg.de/lehrstuehle/swt/se/publications/2005-VerificationKernels/2005-sefm-verification-kernels.pdf.
Using software metrics for predicting vulnerable classes in java and python based systems.
Sultana, Kazi Zakia ; Anu, Vaibhav ; Chong, Tai-Yin
Information Security Journal: A Global Perspective. 2024, Vol. 33 Issue 3, p251-267. 17p.
Specification and Verification: The Spec# Experience.
BARNETT, MIKE ; FÄHNDRICH, MANUEL ; LEINO, K. RUSTAN M. ; et al.
Communications of the ACM. Jun2011, Vol. 54 Issue 6, p81-91. 11p. 2 Color Photographs, 2 Diagrams.
Ingeniería de procesos de software
Bermon Angarita, Leonardo
Engineering Information Security : The Application of Systems Engineering Concepts to Achieve Information Assurance
Stuart Jacobs, Author ; Stuart Jacobs
Secure Compilation to Protected Module Architectures.
PATRIGNANI, MARCO ; AGTEN, PIETER ; STRACKX, RAOUL ; et al.
ACM Transactions on Programming Languages & Systems. Apr2015, Vol. 37 Issue 2, p6:1-6:50. 50p.
A ticket-based access control architecture for object systems.
Hale, John ; Threet, Jody ; Shenoi, Sujeet
Journal of Computer Security. 2000, Vol. 8 Issue 1, p43. 23p. 9 Diagrams.
Secure object referencing for an object-oriented computing system.
Lo, K.M. ; Yu, W.S. ; Fong, A.S.
International Conference on Electrical, Electronic & Computer Engineering, 2004. ICEEC '04; 2004, p273-276, 4p
A SOA and DBUS-based Robotic Component Interaction.
Srivastava, R. P. ; Umrao, L. S. ; Yadav, R. S.
Journal of Scientific Research; 2023, Vol. 15 Issue 1, p11-29, 19p
SSA Transformations to Facilitate Type Inference in Dynamically Typed Code.
QUIROGA, JOSE ; ORTIN, FRANCISCO
Computer Journal; Sep2017, Vol. 60 Issue 9, p1300-1315, 16p
Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs.
Mouris, Dimitris ; Tsoutsos, Nektarios Georgios
IEEE Transactions on Information Forensics & Security; 2021, Vol. 16, p3269-3284, 16p
Modular Reasoning in Object-Oriented Programming.
Naumann, David A.
Verified Software: Theories, Tools, Experiments; 2008, p105-115, 11p
Frameworks compiled from declarations: a language-independent approach.
Walt, Paul ; Consel, Charles ; Balland, Emilie
Software: Practice & Experience; May2017, Vol. 47 Issue 5, p741-762, 22p
Stack-based access control and secure information flow.
ANINDYA BANERJEE ; DAVID A. NAUMANN
Journal of Functional Programming; Mar2005, Vol. 15 Issue 2, p131-177, 47p
Evolutionary Simulation-Based-Design (ESBD) methodology for large computer integrated manufacturing systems.
Shin, Jong Gye ; Sohn, Sug Je
International Journal of Computer Integrated Manufacturing. Aug2001, Vol. 14 Issue 4, p385-398. 14p.
An Extensible Encoding of Object-oriented Data Models in hol.
Achim Brucker ; Burkhart Wolff
Journal of Automated Reasoning; Nov2008, Vol. 41 Issue 3/4, p219-249, 31p
Systems Correctness Practices at Amazon Web Services.
Brooker, Marc ; Desai, Ankush
Communications of the ACM. Jun2025, Vol. 68 Issue 6, p38-42. 5p.
A Survey of Program Analysis for Distributed Software Systems.
Cai, Haipeng
ACM Computing Surveys. Dec2025, Vol. 57 Issue 12, p1-45. 45p.
A Deductive Proof System for Multithreaded Java with Exceptions.
Ábrahám, Erika ; De Roever, Willem-Paul ; De Boer, Frank S. ; et al.
Fundamenta Informaticae; 2008, Vol. 82 Issue 4, p391-463, 73p, 13 Charts
- 1
- 2